Knowledge Bank

Considering a career as a penetration tester or willing to know who the penetration testers at RedSocks Security are? This article is for you! After explaining the purposes of penetration testing, we are now talking about penetration testers. Joeri Blokhuis and Jordi Scharloo give their perspective on the job. A penetration tester’s perspective | Joeri The most exciting engagements are Black Box tests, when you have limited knowledge beforehand. In every engagement, the…

Control of your business assets is key and making sure you are protected against the latest threats nonetheless. Ethical hackers of RedSocks Security will help find the weak spots in your IT environment that supports vital components of your company by conducting penetration testing. What is penetration testing? A penetration test results in an overview of your company’s vulnerabilities and risks in the IT environment. In this day and age, the type of data…

Summary: Cloud Storage Services can be inherently malicious or become malicious as they host cloud based-malware or are used as vectors of infection. Cloud Storage Services enable malware to deploy exponentially and expose organizations to several risks such as data leaks and malicious insiders. Strict policy compliance and traffic analysis can help secure these shared environments. Cloud Storage services enable users to store, edit and retrieve data. Cloud Storage services can be either public…

In this Knowledge Bank article, we take a closer look at Ransomware and how you, and essentially your business, can protect yourself from Ransomware attacks – but before we can deep dive into the world of Ransomware, we need to be on the same page about what ‘Ransomware’ is exactly. What is Ransomware? Ransomware is a malware variant that demands ransom, in the form of monetary payment, from the user that owns or operates the…